General

  • Target

    2024-04-25_922f11511d70fff5bdd6b0d25e659ee0_virlock

  • Size

    563KB

  • Sample

    240425-xwb3bsdg28

  • MD5

    922f11511d70fff5bdd6b0d25e659ee0

  • SHA1

    5e84c670b0ed54c2b2d58b477927cc2c79ff20d1

  • SHA256

    69b78650f82af47446ca82d7d24e46ffa4cd2022855481ad384e90f0f939fb47

  • SHA512

    dca6d0f4bb16db9e6f4e7731bf613efd4e71ff63baf20f4dcf8c57b2bb2fc901e9cd3ecf46e905a9b1e47dd265547ed311f3219a274771c2f64dc4dec5a13510

  • SSDEEP

    6144:qOoQunmFL3sqvbIuhhBTENoh4T1De8ZqfQqP311LdD/fUYuwPawk/hSyVwg:qOSmd8obIuhhBTSpe1vrfHk/hzV/

Malware Config

Targets

    • Target

      2024-04-25_922f11511d70fff5bdd6b0d25e659ee0_virlock

    • Size

      563KB

    • MD5

      922f11511d70fff5bdd6b0d25e659ee0

    • SHA1

      5e84c670b0ed54c2b2d58b477927cc2c79ff20d1

    • SHA256

      69b78650f82af47446ca82d7d24e46ffa4cd2022855481ad384e90f0f939fb47

    • SHA512

      dca6d0f4bb16db9e6f4e7731bf613efd4e71ff63baf20f4dcf8c57b2bb2fc901e9cd3ecf46e905a9b1e47dd265547ed311f3219a274771c2f64dc4dec5a13510

    • SSDEEP

      6144:qOoQunmFL3sqvbIuhhBTENoh4T1De8ZqfQqP311LdD/fUYuwPawk/hSyVwg:qOSmd8obIuhhBTSpe1vrfHk/hzV/

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (79) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks